Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297403
A. Keerthi, R. R., N. Rakesh
With the profligate enhancement in the Internet of Things (IoT), people are able to diligently connect, communicate and remotely monitor and control devices via the Internet. This stupendous advancement has become a boon in solving everyday problems in the Healthcare Industry, through Medical Internet of Things (M-IoT). In the present-day scenario, one of the pressing challenges surfacing is to provide a holistic and self-reliant healthcare system designed for the elderly. This emphasizes a single and reliable system that could effectively cater to the requirements of senior citizens who need some health assistance with everyday activities. This paper proposes a user-friendly app-based solution that collects real-time information and defines a pervasive cost-effective system developed with the aid of sensors and Internet of Things. A survey of fever symptoms is done for people aged above 50 years and Machine Learning analysis is performed to recognize the best model. The proposed system thus keenly aims to keep the family members well-informed about the patient.
{"title":"A Novel Remote Monitoring Smart System for the Elderly using Internet of Things","authors":"A. Keerthi, R. R., N. Rakesh","doi":"10.1109/ICECA49313.2020.9297403","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297403","url":null,"abstract":"With the profligate enhancement in the Internet of Things (IoT), people are able to diligently connect, communicate and remotely monitor and control devices via the Internet. This stupendous advancement has become a boon in solving everyday problems in the Healthcare Industry, through Medical Internet of Things (M-IoT). In the present-day scenario, one of the pressing challenges surfacing is to provide a holistic and self-reliant healthcare system designed for the elderly. This emphasizes a single and reliable system that could effectively cater to the requirements of senior citizens who need some health assistance with everyday activities. This paper proposes a user-friendly app-based solution that collects real-time information and defines a pervasive cost-effective system developed with the aid of sensors and Internet of Things. A survey of fever symptoms is done for people aged above 50 years and Machine Learning analysis is performed to recognize the best model. The proposed system thus keenly aims to keep the family members well-informed about the patient.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128947525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297500
Lekhraj, Avjeet Singh, Alok Kumar, Anoj Kumar
Clustering performs a major role in wireless sensor networks (WSNs) for data aggregation and transmission because efficient energy utilization is becoming a big challenge in WSNs recently to inscribe efficient clustering techniques. Hence, the best set Cluster Heads (CHs) selection remains as a big challenge in WSN to gather data from different sensor nodes. In this script, an approach is introduced for CHs selection by using multi criteria decision making. Seven attributes coverage of CHs, Power of CHs, Sink to CH connectivity, distance of CH to sink, distance of CH to sensor nodes, residual energy of nodes and power of nodes are included for choosing the best set of cluster heads from the available one to balance the energy consumption by using entropy technique for order of preference by similarity to ideal solution (E-TOPSIS) because the conflicting nature of these attributes is difficult to make cooperation in between these attributes. In this MADM (TOPSIS) is used to select best set of CHs by utilizing the eleven attributes for optimal clustering. Finally, the simulation results shows that the propose approach provides a longer service life than the EECS and LEACH and others in the similar environments.
{"title":"Multi-Parameter Based Load Balanced Clustering in WSN Using MADM Technique","authors":"Lekhraj, Avjeet Singh, Alok Kumar, Anoj Kumar","doi":"10.1109/ICECA49313.2020.9297500","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297500","url":null,"abstract":"Clustering performs a major role in wireless sensor networks (WSNs) for data aggregation and transmission because efficient energy utilization is becoming a big challenge in WSNs recently to inscribe efficient clustering techniques. Hence, the best set Cluster Heads (CHs) selection remains as a big challenge in WSN to gather data from different sensor nodes. In this script, an approach is introduced for CHs selection by using multi criteria decision making. Seven attributes coverage of CHs, Power of CHs, Sink to CH connectivity, distance of CH to sink, distance of CH to sensor nodes, residual energy of nodes and power of nodes are included for choosing the best set of cluster heads from the available one to balance the energy consumption by using entropy technique for order of preference by similarity to ideal solution (E-TOPSIS) because the conflicting nature of these attributes is difficult to make cooperation in between these attributes. In this MADM (TOPSIS) is used to select best set of CHs by utilizing the eleven attributes for optimal clustering. Finally, the simulation results shows that the propose approach provides a longer service life than the EECS and LEACH and others in the similar environments.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117336091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297477
Jayprabha J. Patil, Yogesh H. Patil, Amrit Ghosh
Refractive index (RI) of substance, liquid is an imperative optical measure since it possesses the optical property of substance and liquid. Efficient and accurate method of determining the refractive index of transparent liquids plays a significant role in developing optical instruments that are also paramount for chemical research, food, beverage, pharmaceutical and medical applications. Measurement of the refractive index is a basic precondition for various processes as well. We have done a regressive review on the work done in fiber optics based RI sensor in terms of fabrication, sensing region and application areas. The main aim behind this is to propose an intensity modulation based fiber optics RI sensor. We have developed an optical test bench which will take care of intensity stabilization for light source. We tried to propose sensor which will be inexpensive, tiny, can give high sensitivity and repeatability.
{"title":"Fiber Optics Refractive Index Sensor based on Intensity Modulation","authors":"Jayprabha J. Patil, Yogesh H. Patil, Amrit Ghosh","doi":"10.1109/ICECA49313.2020.9297477","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297477","url":null,"abstract":"Refractive index (RI) of substance, liquid is an imperative optical measure since it possesses the optical property of substance and liquid. Efficient and accurate method of determining the refractive index of transparent liquids plays a significant role in developing optical instruments that are also paramount for chemical research, food, beverage, pharmaceutical and medical applications. Measurement of the refractive index is a basic precondition for various processes as well. We have done a regressive review on the work done in fiber optics based RI sensor in terms of fabrication, sensing region and application areas. The main aim behind this is to propose an intensity modulation based fiber optics RI sensor. We have developed an optical test bench which will take care of intensity stabilization for light source. We tried to propose sensor which will be inexpensive, tiny, can give high sensitivity and repeatability.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133645312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297573
C. Spoorthi, Jessy Grace, A. Chavan, C. S. M. Rao
The proposed work investigates the operational robustness and design reliability of 2D and 3D structures of the designed nano-scale devices and circuits, when irradiated by high-energy particles. The TID analysis are performed on 22nm FinFET devices, which is generated by using GDS2MESH tool. The paper presents a methodology for particle strike simulation to understand the ionization charge distribution and identify the vulnerable nodes in the 3D structure of a 22nm FinFET SRAM circuit by varying the Linear Energy Transfer (LET) values from 10MeV to 200Mev. This study is useful in validating the physical structure of a circuit in mitigating the effects of particle strike. In case of memory cell the vulnerable nodes are identified and guarded to isolate the charge distribution due to ionization.
{"title":"Total Ionizing Dose and Radiation Particle Strike Analysis of Nanoscale FinFET Devices and Circuits","authors":"C. Spoorthi, Jessy Grace, A. Chavan, C. S. M. Rao","doi":"10.1109/ICECA49313.2020.9297573","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297573","url":null,"abstract":"The proposed work investigates the operational robustness and design reliability of 2D and 3D structures of the designed nano-scale devices and circuits, when irradiated by high-energy particles. The TID analysis are performed on 22nm FinFET devices, which is generated by using GDS2MESH tool. The paper presents a methodology for particle strike simulation to understand the ionization charge distribution and identify the vulnerable nodes in the 3D structure of a 22nm FinFET SRAM circuit by varying the Linear Energy Transfer (LET) values from 10MeV to 200Mev. This study is useful in validating the physical structure of a circuit in mitigating the effects of particle strike. In case of memory cell the vulnerable nodes are identified and guarded to isolate the charge distribution due to ionization.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133314758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297456
V. Sharma, R. Jaya Krishna, Arjun Singh, V. Rathore
Today secure data hiding is remaining as the demanding topic because of its advantages. Most of the things are delivering electronically during these days, so steganography fulfills this requirement by providing safe data hiding. In this paper, wavelet based secure data hiding is proposed. Initially, the secrete image is encrypted by using pixel scrambling operation with circular shift and swapping operation then the resultant image is added to the cover image. Scrambling process is applied up to N round. The resultant image picture quality has been improved by applying pixel-based correlation operation. The results show the strength of proposed technique. The proposed technique is more robust because the secret image is initially scrambled before embedding.
{"title":"Secure Data Hiding Technique using Secret Image Scrambling","authors":"V. Sharma, R. Jaya Krishna, Arjun Singh, V. Rathore","doi":"10.1109/ICECA49313.2020.9297456","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297456","url":null,"abstract":"Today secure data hiding is remaining as the demanding topic because of its advantages. Most of the things are delivering electronically during these days, so steganography fulfills this requirement by providing safe data hiding. In this paper, wavelet based secure data hiding is proposed. Initially, the secrete image is encrypted by using pixel scrambling operation with circular shift and swapping operation then the resultant image is added to the cover image. Scrambling process is applied up to N round. The resultant image picture quality has been improved by applying pixel-based correlation operation. The results show the strength of proposed technique. The proposed technique is more robust because the secret image is initially scrambled before embedding.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133134605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297412
Shrishti Shukla, Pratyush Sharma
This paper aims to collect, map and model elements that will lead to the finding of phishing UR automatically, for this purpose data mining is used as a basic tool and in this sense, it is considered that the existing patterns in a URL will make it possible to distinguish the legitimate link for pages. Whereas, the identification of these patterns will serve to model a successful classification method. For this purpose, the attributes found in the database “phishing web” that correspond to patterns of phishing pages will be validated, at the same time it will be evaluated algorithms extracted from the literature that allow a better classification of records, finally, a model with the highest precision results is delivered and it consists of Bayesian optimized support vector machine classifier.
{"title":"Detection of Phishing URL using Bayesian Optimized SVM Classifier","authors":"Shrishti Shukla, Pratyush Sharma","doi":"10.1109/ICECA49313.2020.9297412","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297412","url":null,"abstract":"This paper aims to collect, map and model elements that will lead to the finding of phishing UR automatically, for this purpose data mining is used as a basic tool and in this sense, it is considered that the existing patterns in a URL will make it possible to distinguish the legitimate link for pages. Whereas, the identification of these patterns will serve to model a successful classification method. For this purpose, the attributes found in the database “phishing web” that correspond to patterns of phishing pages will be validated, at the same time it will be evaluated algorithms extracted from the literature that allow a better classification of records, finally, a model with the highest precision results is delivered and it consists of Bayesian optimized support vector machine classifier.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127069234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297589
R. Suguna, P. Sathishkumar, S. Deepa
The world is filled with information and getting the right information is a challenging task for internet users and online buyers. Recommender system helps internet users to get their information in a short span of time. It acts as an information extraction system that works behind users to perform their search easier. The recommender system comes under user’s content or item based search, similar users browsing behavior called collaborative and combination of both known as a hybrid. Here collaborative-based approach is adopted which recommends items to their users based on their past browsing behavior. In this article, the User-Item-Rating matrix is formulated concerning user personal profile, rating of the product, and reviews given by the users during their previous browsing history. In this research, user location is considered as an important attribute to group similar users. It also attempts to suppress the scalability and sparsity problems of the traditional collaborative filtering approach. So, the User-Item-Rating (UIR) matrix has considered the location, ratings and reviews for future recommendation. The Navie Bayes classifier algorithm is used to provide accurate topmost recommendations to internet users. The data set is taken from the MovieLens and IMDb database. The accuracy of the recommender system is measured based on the main metric f-measure. The experimental result has proven the improvement of the recommender system with the mentioned added attributes.
{"title":"User Location and Collaborative based Recommender System using Naive Bayes Classifier and UIR Matrix","authors":"R. Suguna, P. Sathishkumar, S. Deepa","doi":"10.1109/ICECA49313.2020.9297589","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297589","url":null,"abstract":"The world is filled with information and getting the right information is a challenging task for internet users and online buyers. Recommender system helps internet users to get their information in a short span of time. It acts as an information extraction system that works behind users to perform their search easier. The recommender system comes under user’s content or item based search, similar users browsing behavior called collaborative and combination of both known as a hybrid. Here collaborative-based approach is adopted which recommends items to their users based on their past browsing behavior. In this article, the User-Item-Rating matrix is formulated concerning user personal profile, rating of the product, and reviews given by the users during their previous browsing history. In this research, user location is considered as an important attribute to group similar users. It also attempts to suppress the scalability and sparsity problems of the traditional collaborative filtering approach. So, the User-Item-Rating (UIR) matrix has considered the location, ratings and reviews for future recommendation. The Navie Bayes classifier algorithm is used to provide accurate topmost recommendations to internet users. The data set is taken from the MovieLens and IMDb database. The accuracy of the recommender system is measured based on the main metric f-measure. The experimental result has proven the improvement of the recommender system with the mentioned added attributes.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123432102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297400
M. M, J. Shanmugam, V. S. Ghali
Non-stationary optical stimulus based infrared non-destructive testing modality has gained much attention from past decades. Various post processing techniques based on signal and image processing have been proposed for better visualization and quantification of subsurface defects for Non-Stationary Thermal Wave Imaging (NSTWD. In present work, a new post processing approach named fan chirp transform is adapted to perfectly match the chirp rate from sample thermal response to facilitate better visualization of defects. The merit of proposed method is compared with the conventional post processing methods like Fast Fourier Transform (FFT) phase, pulse compression (PC) and principle component analysis (PCA). By considering the parameter of merits such as signal to noise ratio of defective pixels and full width at half maxima for defect sizing. It is observed that the adapted Fan-Chirp transform provides better defect detection and better signal to noise ratios.
{"title":"Fan-chirp Transform based Thermal Wave Imaging","authors":"M. M, J. Shanmugam, V. S. Ghali","doi":"10.1109/ICECA49313.2020.9297400","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297400","url":null,"abstract":"Non-stationary optical stimulus based infrared non-destructive testing modality has gained much attention from past decades. Various post processing techniques based on signal and image processing have been proposed for better visualization and quantification of subsurface defects for Non-Stationary Thermal Wave Imaging (NSTWD. In present work, a new post processing approach named fan chirp transform is adapted to perfectly match the chirp rate from sample thermal response to facilitate better visualization of defects. The merit of proposed method is compared with the conventional post processing methods like Fast Fourier Transform (FFT) phase, pulse compression (PC) and principle component analysis (PCA). By considering the parameter of merits such as signal to noise ratio of defective pixels and full width at half maxima for defect sizing. It is observed that the adapted Fan-Chirp transform provides better defect detection and better signal to noise ratios.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121907036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297455
K. Dharani, A. Mohanarathinam, Shafiq Mansoor, M. DaraniKumar, P. Sasikala
Pandemic diseases are affecting humans at an unprecedented rate in this period of unparalleled global change. The increasing outbreak of epidemic diseases are associated with global climate change, loss of biodiversity, urbanization, extensive farming, and deforestation. Among these, deforestation dominates for the beginning of diseases, which spread further through wild animals-human interface. The exponential growth of international travel and trade drives the epidemic disease to a pandemic. This paper explains how the diseases are originated from deforestation and being converted from epidemic to pandemic.
{"title":"Deforestation is a Cause of Pandemic – A Systematic Analysis","authors":"K. Dharani, A. Mohanarathinam, Shafiq Mansoor, M. DaraniKumar, P. Sasikala","doi":"10.1109/ICECA49313.2020.9297455","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297455","url":null,"abstract":"Pandemic diseases are affecting humans at an unprecedented rate in this period of unparalleled global change. The increasing outbreak of epidemic diseases are associated with global climate change, loss of biodiversity, urbanization, extensive farming, and deforestation. Among these, deforestation dominates for the beginning of diseases, which spread further through wild animals-human interface. The exponential growth of international travel and trade drives the epidemic disease to a pandemic. This paper explains how the diseases are originated from deforestation and being converted from epidemic to pandemic.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126180958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-05DOI: 10.1109/ICECA49313.2020.9297655
A. Tyagi, Terrance Frederick Fernandez, S. Aswathy
The frequency of election has been increased in multiple parts of the country. Being the largest democracy, India takes several months for accomplishing elections. Additionally, the elections demand government works, development, cost, tenure, etc. Since 1999, Electronic Voting Machine [EVM]have deployed widely to ensure that the voting can also be made tamper-proof. India has introduced Electronic Voting Machines (EVM) way back in 2004 for its parliamentary election with 380 million networked voters. EVM, being an electronic system was used to record votes. Only Bharat Electronics Limited and Electronics Corporation of India Limited conduct EVM and VVPATs (Voter Verifiable Paper Audit Trail) checks. The sole solution to the issue is introduction of Aadhaar; a unique identification number. The proposed research work introduces a novel concept that provides tamperless and paperless election in India. In summary, this work provides a simple, reliable concept using Blockchain technology and Aadhaar for deploying paperless electronic voting in India.
{"title":"Blockchain and Aadhaar based Electronic Voting System","authors":"A. Tyagi, Terrance Frederick Fernandez, S. Aswathy","doi":"10.1109/ICECA49313.2020.9297655","DOIUrl":"https://doi.org/10.1109/ICECA49313.2020.9297655","url":null,"abstract":"The frequency of election has been increased in multiple parts of the country. Being the largest democracy, India takes several months for accomplishing elections. Additionally, the elections demand government works, development, cost, tenure, etc. Since 1999, Electronic Voting Machine [EVM]have deployed widely to ensure that the voting can also be made tamper-proof. India has introduced Electronic Voting Machines (EVM) way back in 2004 for its parliamentary election with 380 million networked voters. EVM, being an electronic system was used to record votes. Only Bharat Electronics Limited and Electronics Corporation of India Limited conduct EVM and VVPATs (Voter Verifiable Paper Audit Trail) checks. The sole solution to the issue is introduction of Aadhaar; a unique identification number. The proposed research work introduces a novel concept that provides tamperless and paperless election in India. In summary, this work provides a simple, reliable concept using Blockchain technology and Aadhaar for deploying paperless electronic voting in India.","PeriodicalId":297285,"journal":{"name":"2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129823261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}